Hosted Email Security Administrator's Guide > Inbound and Outbound Protection
        • Online Help Center Home

        • Privacy and Personal Data Collection Disclosure
        • About Trend Micro Hosted Email Security
          • Service Requirements
          • What's New
          • Inbound Message Flow
            • Connection-Based Filtering at the MTA Connection Level
            • Content-Based Filtering at the Message Level
          • Outbound Message Protection
        • Getting Started with Hosted Email Security
          • Accessing the Hosted Email Security Administrator Console
          • Accessing the Cloud App Security Management Console
        • Working with the Dashboard
          • Threats Tab
            • Ransomware Details Chart
            • Threats Chart
            • Threats Details Chart
            • Virtual Analyzer Analysis Details Chart
            • Domain-based Authentication Details Chart
          • Top Statistics Tab
            • Top Business Email Compromise Threats Chart
            • Top Analyzed Advanced Threats Chart
            • Top Malware Detected by Predictive Machine Learning Chart
            • Top Malware Detected by Pattern-based Scanning Chart
            • Top Spam Chart
            • Top Data Loss Prevention (DLP) Incidents Chart
          • Other Statistics Tab
            • Volume Chart
            • Bandwidth Chart
            • Time-of-Click Protection Chart
        • About Domain Management
          • Adding a Domain
          • Configuring a Domain
            • Adding SPF Records
            • Adding Office 365 Inbound Connectors
            • Adding Office 365 Outbound Connectors
          • Editing or Deleting Domains
        • Inbound and Outbound Protection
          • Managing Recipient Filter
          • Managing Sender Filter
            • Sender Address Types
            • Configuring Approved and Blocked Sender Lists
              • Adding Senders
              • Editing Senders
              • Importing and Exporting Senders
          • Configuring Policy Objects
            • About Keyword Expressions
              • Using Keyword Expressions
              • Adding Keyword Expressions
              • Editing Keyword Expressions
            • Managing Notifications
            • Managing Stamps
            • Managing the Web Reputation Approved List
            • Data Loss Prevention (DLP)
              • Data Identifier Types
                • Expressions
                  • Predefined Expressions
                  • Customized Expressions
                    • Criteria for Customized Expressions
                    • Creating a Customized Expression
                    • Importing Customized Expressions
                • Keywords
                  • Predefined Keyword Lists
                  • Customized Keyword Lists
                    • Customized Keyword List Criteria
                    • Creating a Keyword List
                    • Importing a Keyword List
                • File Attributes
                  • Predefined File Attributes List
                  • Creating a File Attribute List
                  • Importing a File Attribute List
              • DLP Compliance Templates
                • Predefined DLP Templates
                • Customized DLP Templates
                  • Condition Statements and Logical Operators
                  • Creating a Template
                  • Importing Templates
          • Configuring High Profile Users
          • Configuring Scan Exceptions
            • Scan Exception List
            • Configuring "Scan Exceptions" Actions
          • Understanding IP Reputation
            • About Dynamic IP Reputation Settings
            • About Standard IP Reputation Settings
            • About Approved and Blocked IP Addresses
            • Troubleshooting Issues
          • About Transport Layer Security (TLS) Peers
            • Adding TLS Peers
            • Editing TLS Peers
          • About Sender Policy Framework (SPF)
            • Enabling or Disabling Sender Policy Framework (SPF)
            • Adding an SPF Peer to the Ignored List
            • Editing an SPF Peer in the Ignored List
            • Deleting SPF Peers from Ignored List
          • About DomainKeys Identified Mail (DKIM)
            • Adding DKIM Verification Settings
            • Editing DKIM Verification Settings
            • Adding DKIM Signing Settings
            • Editing DKIM Signing Settings
          • About Domain-based Message Authentication, Reporting & Conformance (DMARC)
            • Adding DMARC Settings
            • Editing DMARC Settings
          • How DMARC Works with SPF and DKIM
          • Configuring Time-of-Click Protection Settings
        • Configuring Policies
          • Managing Policy Rules
          • Customizing the Rule Order
          • Naming and Enabling a Rule
          • Specifying Recipients and Senders
            • Inbound Policy Rules
            • Outbound Policy Rules
          • About Rule Scanning Criteria
            • Configuring Malware or Malicious Code Criteria
              • About Advanced Threat Scan Engine
              • About Predictive Machine Learning
            • Configuring Spam Criteria
            • Configuring Business Email Compromise Criteria
            • Configuring Phishing Criteria
            • Configuring Graymail Criteria
            • Configuring Web Reputation Criteria
            • Configuring Social Engineering Attack Criteria
            • Configuring Data Loss Prevention Criteria
            • Configuring Advanced Criteria
              • Using Attachment Name or Extension Criteria
              • Using Attachment MIME Content-type Criteria
              • Using Attachment True File Type Criteria
              • Using Message Size Criteria
              • Using Subject Matches Criteria
              • Using Subject is Blank Criteria
              • Using Body Matches Criteria
              • Using Specified Header Matches Criteria
              • Using Attachment Content Matches Keyword Criteria
              • Using Attachment Size Criteria
              • Using Attachment Number Criteria
              • Using Attachment is Password Protected Criteria
              • Using the Number of Recipients Criteria
          • About Rule Actions
            • Specifying Rule Actions
            • "Intercept" Actions
              • Using the Delete Action
              • Using the Deliver Now Action
              • Using the Quarantine Action
              • Using the Change Recipient Action
            • "Modify" Actions
              • Cleaning Cleanable Malware
              • Deleting Matching Attachments
              • Insert an X-Header
              • Inserting a Stamp
                • Configuring Stamps
              • Tagging the Subject Line
              • Rule Tokens/Variables
            • "Monitor" Actions
              • Using the Bcc Action
            • Encrypting Outbound Messages
              • Reading an Encrypted Email Message
            • About the Send Notification Action
              • Configuring Send Notification Actions
              • Duplicating or Copying Send Notification Actions
              • Removing Notifications from Rule Actions
              • Deleting Notifications from Lists of Messages
        • Understanding Quarantine
          • Querying the Quarantine
          • Configuring End User Quarantine Console Settings
          • About the Quarantine Digest
            • Configuring the Quarantine Digest
        • Logs in Hosted Email Security
          • Understanding Mail Tracking
            • About Accepted Traffic
            • About Blocked Traffic
            • Social Engineering Attack Log Details
            • Business Email Compromise Log Details
          • Understanding Policy Events
            • Predictive Machine Learning Log Details
          • Understanding URL Click Tracking
          • Understanding Audit Log
        • Configuring Administration Settings
          • About Account Management
            • Adding and Configuring an Administrator Account
            • Editing Administrator Account Configuration
            • Deleting Administrator Accounts
            • Changing Administrator Passwords
            • Enabling or Disabling an Administrator Account
          • Changing End-User Passwords
          • About End-User Managed Accounts
            • Removing End-User Managed Accounts
          • About Logon Methods
            • Configuring Active Directory Federation Services 2.0
            • Configuring Azure Active Directory
            • Configuring Single Sign-On
            • Configuring Automatic Logon in Web Browsers
          • About Directory Management
            • Importing User Directories
            • Synchronizing User Directory
            • Verifying User Directories
          • Installing Web Services and Active Directory Synchronization Tool
          • About Co-Branding
            • Accessing the Co-Branded Administrator Console and End User Quarantine Console
          • Viewing Your Service Level Agreement
          • Viewing License Information
        • FAQs and Instructions
          • About MX Records and Hosted Email Security
          • General Order of Evaluation
          • Sender Filter Order of Evaluation
          • IP Reputation Order of Evaluation
          • How to Work with Non-AD Directories
          • Feature Limits and Capability Restrictions
          • Known Issues
        • Technical Support
          • Contacting Support
            • Using the Support Portal
            • Speeding Up the Support Call
          • Sending Suspicious Content to Trend Micro
            • Email Reputation Services
            • File Reputation Services
            • Web Reputation Services
          • Troubleshooting Resources
            • Threat Encyclopedia
            • Download Center
            • Documentation Feedback

        Inbound and Outbound Protection

        • Managing Recipient Filter
        • Managing Sender Filter
        • Configuring Policy Objects
        • Configuring High Profile Users
        • Configuring Scan Exceptions
        • Understanding IP Reputation
        • About Transport Layer Security (TLS) Peers
        • About Sender Policy Framework (SPF)
        • About DomainKeys Identified Mail (DKIM)
        • About Domain-based Message Authentication, Reporting & Conformance (DMARC)
        • How DMARC Works with SPF and DKIM
        • Configuring Time-of-Click Protection Settings